SlideShare a Scribd company logo
CONTACT: PRAVEEN KUMAR. L (, +91 – 9791938249)
MAIL ID: sunsid1989@gmail.com, praveen@nexgenproject.com
Web: www.nexgenproject.com, www.finalyear-ieeeprojects.com
ATTRIBUTE-BASED DATA SHARING SCHEME REVISITED IN
CLOUD COMPUTING
ABSTRACT:
Ciphertext-policy attribute-based encryption (CPABE) is a very promising
encryption technique for secure data sharing in the context of cloud
computing. Data owner is allowed to fully control the access policy associated
with his data which to be shared. However, CP-ABE is limited to a potential
security risk that is known as key escrow problem whereby the secret keys of
users have to be issued by a trusted key authority. Besides, most of the existing
CP-ABE schemes cannot support attribute with arbitrary state. In this paper,
we revisit attribute-based data sharing scheme in order to solve the key
escrow issue but also improve the expressiveness of attribute, so that the
resulting scheme is more friendly to cloud computing applications. We propose
an improved two-party key issuing protocol that can guarantee that neither
key authority nor cloud service provider can compromise the whole secret key
of a user individually. Moreover, we introduce the concept of attribute with
weight, being provided to enhance the expression of attribute, which can not
only extend the expression from binary to arbitrary state, but also lighten the
complexity of access policy. Therefore, both storage cost and encryption
complexity for a ciphertext are relieved. The performance analysis and security
proof show that the proposed scheme is able to achieve efficient and secure
data sharing in cloud computing.
CONCLUSION
CONTACT: PRAVEEN KUMAR. L (, +91 – 9791938249)
MAIL ID: sunsid1989@gmail.com, praveen@nexgenproject.com
Web: www.nexgenproject.com, www.finalyear-ieeeprojects.com
In this paper, we redesigned an attribute-based data sharing scheme in cloud
computing. The improved key issuing protocol was presented to resolve the
key escrow problem. It enhances data confidentiality and privacy in cloud
system against the managers of KA and CSP as well as malicious system
outsiders, where KA and CSP are semi-trusted. In addition, the weighted
attribute was proposed to improve the expression of attribute, which can not
only describe arbitrarystate attributes, but also reduce the complexity of
access policy, so that the storage cost of ciphertext and time cost in encryption
can be saved. Finally, we presented the performance and security analyses for
the proposed scheme, in which the results demonstrate high efficiency and
security of our scheme.
REFERENCES
[1] J. Baek, Q. H. Vu, J. K. Liu, X. Huang, and Y. Xiang. A secure cloud computing
based framework for big data information management of smart grid. IEEE
Transactions on Cloud Computing, 3(2):233–244, 2015.
[2] A. Balu and K. Kuppusamy. An expressive and provably secure ciphertext-
policy attribute-based encryption. Information Sciences, 276(4):354–362, 2014.
[3] M. Belenkiy, J. Camenisch, M. Chase, M. Kohlweiss, A. Lysyanskaya, and H.
Shacham. Randomizable proofs and delegatable anonymous credentials.
Proceedings of the 29th Annual International Cryptology Conference, pages
108–125, 2009.
CONTACT: PRAVEEN KUMAR. L (, +91 – 9791938249)
MAIL ID: sunsid1989@gmail.com, praveen@nexgenproject.com
Web: www.nexgenproject.com, www.finalyear-ieeeprojects.com
[4] J. Bethencourt, A. Sahai, and B. Waters. Ciphertext-policy attributebased
encryption. IEEE Symposium on Security and Privacy, pages 321–334, 2007.
[5] D. Boneh, B. Lynn, and H. Shacham. Short signatures from the weil pairing.
Journal of Cryptology, 17(4):297–319, 2001.
[6] M. Chase. Multi-authority attribute based encryption. Proceedings of the
4th Conference on Theory of Cryptography, pages 515–534, 2007.
[7] M. Chase and S. S. Chow. Improving privacy and security in multiauthority
attribute-based encryption. Proceedings of the 16th ACM Conference on
Computer and Communications Security, pages 121–130, 2009.
[8] L. Cheung and C. Newport. Provably secure ciphertext policy ABE.
Proceedings of the 14th ACM conference on Computer and communications
security, pages 456–465, 2007.
[9] S. S. Chow. Removing escrow from identity-based encryption. Proceedings
of the 12th International Conference on Practice and Theory in Public Key
Cryptography, pages 256–276, 2009.
[10] C. K. Chu, W. T. Zhu, J. Han, J. K. Liu, J. Xu, and J. Zhou. Security concerns in
popular cloud storage services. IEEE Pervasive Computing, 12(4):50–57, 2013.
[11] A. De Caro and V. Iovino. JPBC: java pairing based cryptography. IEEE
sSymposium on Computers and Communications, 22(3):850–855, 2011.
Ad

Recommended

PPTX
Final_attribute based encryption in cloud with significant reduction of compu...
Naveena N
 
PPTX
Authentication on Cloud using Attribute Based Encryption
Ankit Raj
 
PPTX
Attribute based encryption in cloud with significant reduction reviw2
Naveena N
 
DOCX
Attribute based encryption with verifiable outsourced decryption
IEEEFINALYEARPROJECTS
 
PPTX
Attributes based encryption with verifiable outsourced decryption
KaashivInfoTech Company
 
DOCX
Audit free cloud storage via deniable attribute based encryption
Mano Sriram
 
DOCX
expressive, efficient, and revocable data access control for multi authority ...
swathi78
 
DOCX
JPJ1407 Expressive, Efficient, and Revocable Data Access Control for Multi-...
chennaijp
 
DOC
Hasbe a hierarchical attribute based solution for flexible and scalable acces...
parry prabhu
 
PDF
ENABLING CLOUD STORAGE AUDITING WITH VERIFIABLE OUTSOURCING OF KEY UPDATES
Nexgen Technology
 
DOCX
Audit free cloud storage via deniable attribute based encryption
Kamal Spring
 
PDF
Acquisition of Secured Data from Cloud
IJMTST Journal
 
PPTX
Secure sensitive data sharing on a big data platform
Nexgen Technology
 
DOCX
An Attribute-based Controlled Collaborative Access Control Scheme for Public ...
JAYAPRAKASH JPINFOTECH
 
DOCX
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Pvrtechnologies Nellore
 
PDF
Secure sensitive data sharing on a big data platform
redpel dot com
 
PDF
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
Naseem nisar
 
PDF
Audit free cloud storage via deniable attribute-based encryption
Pvrtechnologies Nellore
 
PDF
Hybrid Security Network for Cloud Information Centre (HSNIC)
Peace Asukwo
 
PPTX
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING
Kayalvizhi Selvaraj
 
PDF
SECURE DATA SHARING IN CLOUD COMPUTING USING REVOCABLE-STORAGE IDENTITY-BASED...
Nexgen Technology
 
DOCX
Privacy preserving delegated access control in public clouds
IEEEFINALYEARPROJECTS
 
PDF
Privacy preserving delegated access control in public cloud
Aswathy Rajan
 
PPSX
Final year presentation
Abhishek Jain
 
DOCX
Privacy preserving delegated access control in public clouds
LeMeniz Infotech
 
PDF
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
IJECEIAES
 
PPT
Privacy preserving public auditing for secure cloud storage
Mustaq Syed
 
DOCX
Privacy preserving delegated access control in public clouds
JPINFOTECH JAYAPRAKASH
 
PDF
Attribute based data sharing scheme revisited in cloud computing
ieeepondy
 
PPTX
Attribute-Based Encryption for Cloud Security
Mphasis
 

More Related Content

What's hot (20)

DOC
Hasbe a hierarchical attribute based solution for flexible and scalable acces...
parry prabhu
 
PDF
ENABLING CLOUD STORAGE AUDITING WITH VERIFIABLE OUTSOURCING OF KEY UPDATES
Nexgen Technology
 
DOCX
Audit free cloud storage via deniable attribute based encryption
Kamal Spring
 
PDF
Acquisition of Secured Data from Cloud
IJMTST Journal
 
PPTX
Secure sensitive data sharing on a big data platform
Nexgen Technology
 
DOCX
An Attribute-based Controlled Collaborative Access Control Scheme for Public ...
JAYAPRAKASH JPINFOTECH
 
DOCX
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Pvrtechnologies Nellore
 
PDF
Secure sensitive data sharing on a big data platform
redpel dot com
 
PDF
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
Naseem nisar
 
PDF
Audit free cloud storage via deniable attribute-based encryption
Pvrtechnologies Nellore
 
PDF
Hybrid Security Network for Cloud Information Centre (HSNIC)
Peace Asukwo
 
PPTX
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING
Kayalvizhi Selvaraj
 
PDF
SECURE DATA SHARING IN CLOUD COMPUTING USING REVOCABLE-STORAGE IDENTITY-BASED...
Nexgen Technology
 
DOCX
Privacy preserving delegated access control in public clouds
IEEEFINALYEARPROJECTS
 
PDF
Privacy preserving delegated access control in public cloud
Aswathy Rajan
 
PPSX
Final year presentation
Abhishek Jain
 
DOCX
Privacy preserving delegated access control in public clouds
LeMeniz Infotech
 
PDF
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
IJECEIAES
 
PPT
Privacy preserving public auditing for secure cloud storage
Mustaq Syed
 
DOCX
Privacy preserving delegated access control in public clouds
JPINFOTECH JAYAPRAKASH
 
Hasbe a hierarchical attribute based solution for flexible and scalable acces...
parry prabhu
 
ENABLING CLOUD STORAGE AUDITING WITH VERIFIABLE OUTSOURCING OF KEY UPDATES
Nexgen Technology
 
Audit free cloud storage via deniable attribute based encryption
Kamal Spring
 
Acquisition of Secured Data from Cloud
IJMTST Journal
 
Secure sensitive data sharing on a big data platform
Nexgen Technology
 
An Attribute-based Controlled Collaborative Access Control Scheme for Public ...
JAYAPRAKASH JPINFOTECH
 
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Pvrtechnologies Nellore
 
Secure sensitive data sharing on a big data platform
redpel dot com
 
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
Naseem nisar
 
Audit free cloud storage via deniable attribute-based encryption
Pvrtechnologies Nellore
 
Hybrid Security Network for Cloud Information Centre (HSNIC)
Peace Asukwo
 
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING
Kayalvizhi Selvaraj
 
SECURE DATA SHARING IN CLOUD COMPUTING USING REVOCABLE-STORAGE IDENTITY-BASED...
Nexgen Technology
 
Privacy preserving delegated access control in public clouds
IEEEFINALYEARPROJECTS
 
Privacy preserving delegated access control in public cloud
Aswathy Rajan
 
Final year presentation
Abhishek Jain
 
Privacy preserving delegated access control in public clouds
LeMeniz Infotech
 
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
IJECEIAES
 
Privacy preserving public auditing for secure cloud storage
Mustaq Syed
 
Privacy preserving delegated access control in public clouds
JPINFOTECH JAYAPRAKASH
 

Viewers also liked (10)

PDF
Attribute based data sharing scheme revisited in cloud computing
ieeepondy
 
PPTX
Attribute-Based Encryption for Cloud Security
Mphasis
 
DOCX
Attribute Based Encryption
UT, San Antonio
 
PDF
LEVERAGING DATA DEDUPLICATION TO IMPROVE THE PERFORMANCE OF PRIMARY STORAGE S...
Nexgen Technology
 
PPTX
A Fully Anonymous Attribute-Based Encryption to Control Cloud Data Access and...
Pawan Arya
 
PPTX
Attribute Based Encryption with Privacy Preserving In Clouds
Swathi Rampur
 
PDF
TWO-FACTOR DATA SECURITY PROTECTION MECHANISM FOR CLOUD STORAGE SYSTEM
Nexgen Technology
 
PPT
Cloud computing simple ppt
Agarwaljay
 
PPTX
Introduction of Cloud computing
Rkrishna Mishra
 
PPTX
cloud computing ppt
himanshuawasthi2109
 
Attribute based data sharing scheme revisited in cloud computing
ieeepondy
 
Attribute-Based Encryption for Cloud Security
Mphasis
 
Attribute Based Encryption
UT, San Antonio
 
LEVERAGING DATA DEDUPLICATION TO IMPROVE THE PERFORMANCE OF PRIMARY STORAGE S...
Nexgen Technology
 
A Fully Anonymous Attribute-Based Encryption to Control Cloud Data Access and...
Pawan Arya
 
Attribute Based Encryption with Privacy Preserving In Clouds
Swathi Rampur
 
TWO-FACTOR DATA SECURITY PROTECTION MECHANISM FOR CLOUD STORAGE SYSTEM
Nexgen Technology
 
Cloud computing simple ppt
Agarwaljay
 
Introduction of Cloud computing
Rkrishna Mishra
 
cloud computing ppt
himanshuawasthi2109
 
Ad

Similar to ATTRIBUTE-BASED DATA SHARING SCHEME REVISITED IN CLOUD COMPUTING,bulk ieee projects , (20)

PDF
AN EFFICIENT FILE HIERARCHY ATTRIBUTE-BASED ENCRYPTION SCHEME IN CLOUD COMPUT...
Nexgen Technology
 
PDF
SecRBAC: Secure data in the Clouds
Nexgen Technology
 
PDF
PROBABILISTIC OPTIMIZATION OF RESOURCE DISTRIBUTION AND ENCRYPTION FOR DATA S...
Nexgen Technology
 
PPTX
Secure sensitive data sharing on a big data platform
Nexgen Technology
 
PDF
Improving security for data migration in cloud computing using randomized enc...
IOSR Journals
 
PDF
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET Journal
 
PDF
Efficient and Empiric Keyword Search Using Cloud
IRJET Journal
 
PDF
survey paper on cp abe cloud computing
INFOGAIN PUBLICATION
 
PDF
PRIVATE OVER-THRESHOLD AGGREGATION PROTOCOLS OVER DISTRIBUTED DATASETS
Nexgen Technology
 
PDF
An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...
Editor IJCATR
 
PDF
DYNAMIC AND PUBLIC AUDITING WITH FAIR ARBITRATION FOR CLOUD DATA
Nexgen Technology
 
PDF
ENABLING FINE-GRAINED MULTI-KEYWORD SEARCH SUPPORTING CLASSIFIED SUB-DICTION...
Nexgen Technology
 
PDF
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
dbpublications
 
PDF
IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKI...
Nexgen Technology
 
PDF
CP-ABE Scheme with extended reliability factor and load balancing in distribu...
International Journal of Engineering Inventions www.ijeijournal.com
 
PDF
B04010610
IJMER
 
PDF
Mitigating the Integrity Issues in Cloud Computing Utilizing Cryptography Alg...
AJASTJournal
 
PDF
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
IRJET Journal
 
PDF
deep dive down on how NCLA works in IOTs
gavrielsembiring
 
AN EFFICIENT FILE HIERARCHY ATTRIBUTE-BASED ENCRYPTION SCHEME IN CLOUD COMPUT...
Nexgen Technology
 
SecRBAC: Secure data in the Clouds
Nexgen Technology
 
PROBABILISTIC OPTIMIZATION OF RESOURCE DISTRIBUTION AND ENCRYPTION FOR DATA S...
Nexgen Technology
 
Secure sensitive data sharing on a big data platform
Nexgen Technology
 
Improving security for data migration in cloud computing using randomized enc...
IOSR Journals
 
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET Journal
 
Efficient and Empiric Keyword Search Using Cloud
IRJET Journal
 
survey paper on cp abe cloud computing
INFOGAIN PUBLICATION
 
PRIVATE OVER-THRESHOLD AGGREGATION PROTOCOLS OVER DISTRIBUTED DATASETS
Nexgen Technology
 
An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...
Editor IJCATR
 
DYNAMIC AND PUBLIC AUDITING WITH FAIR ARBITRATION FOR CLOUD DATA
Nexgen Technology
 
ENABLING FINE-GRAINED MULTI-KEYWORD SEARCH SUPPORTING CLASSIFIED SUB-DICTION...
Nexgen Technology
 
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
dbpublications
 
IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKI...
Nexgen Technology
 
CP-ABE Scheme with extended reliability factor and load balancing in distribu...
International Journal of Engineering Inventions www.ijeijournal.com
 
B04010610
IJMER
 
Mitigating the Integrity Issues in Cloud Computing Utilizing Cryptography Alg...
AJASTJournal
 
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
IRJET Journal
 
deep dive down on how NCLA works in IOTs
gavrielsembiring
 
Ad

More from Nexgen Technology (20)

DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
Nexgen Technology
 
DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
Nexgen Technology
 
DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
Nexgen Technology
 
DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
Nexgen Technology
 
DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
Nexgen Technology
 
DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
Nexgen Technology
 
DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CH...
Nexgen Technology
 
DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHENN...
Nexgen Technology
 
DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
Nexgen Technology
 
DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
Nexgen Technology
 
DOCX
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHENNA...
Nexgen Technology
 
DOCX
Ieee 2020 21 vlsi projects in pondicherry,ieee vlsi projects in chennai
Nexgen Technology
 
DOCX
Ieee 2020 21 power electronics in pondicherry,Ieee 2020 21 power electronics
Nexgen Technology
 
DOCX
Ieee 2020 -21 ns2 in pondicherry, Ieee 2020 -21 ns2 projects,best project cen...
Nexgen Technology
 
DOCX
Ieee 2020 21 ns2 in pondicherry,best project center in pondicherry,final year...
Nexgen Technology
 
DOCX
Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...
Nexgen Technology
 
DOCX
Ieee 2020 21 iot in pondicherry,final year projects in pondicherry,project ce...
Nexgen Technology
 
DOCX
Ieee 2020 21 blockchain in pondicherry,final year projects in pondicherry,bes...
Nexgen Technology
 
DOCX
Ieee 2020 -21 bigdata in pondicherry,project center in pondicherry,best proje...
Nexgen Technology
 
DOCX
Ieee 2020 21 embedded in pondicherry,final year projects in pondicherry,best...
Nexgen Technology
 
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
Nexgen Technology
 
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
Nexgen Technology
 
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
Nexgen Technology
 
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
Nexgen Technology
 
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
Nexgen Technology
 
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
Nexgen Technology
 
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CH...
Nexgen Technology
 
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHENN...
Nexgen Technology
 
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
Nexgen Technology
 
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
Nexgen Technology
 
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHENNA...
Nexgen Technology
 
Ieee 2020 21 vlsi projects in pondicherry,ieee vlsi projects in chennai
Nexgen Technology
 
Ieee 2020 21 power electronics in pondicherry,Ieee 2020 21 power electronics
Nexgen Technology
 
Ieee 2020 -21 ns2 in pondicherry, Ieee 2020 -21 ns2 projects,best project cen...
Nexgen Technology
 
Ieee 2020 21 ns2 in pondicherry,best project center in pondicherry,final year...
Nexgen Technology
 
Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...
Nexgen Technology
 
Ieee 2020 21 iot in pondicherry,final year projects in pondicherry,project ce...
Nexgen Technology
 
Ieee 2020 21 blockchain in pondicherry,final year projects in pondicherry,bes...
Nexgen Technology
 
Ieee 2020 -21 bigdata in pondicherry,project center in pondicherry,best proje...
Nexgen Technology
 
Ieee 2020 21 embedded in pondicherry,final year projects in pondicherry,best...
Nexgen Technology
 

Recently uploaded (20)

PPTX
IIT KGP Quiz Week 2024 Sports Quiz (Prelims + Finals)
IIT Kharagpur Quiz Club
 
PPTX
LAZY SUNDAY QUIZ "A GENERAL QUIZ" JUNE 2025 SMC QUIZ CLUB, SILCHAR MEDICAL CO...
Ultimatewinner0342
 
PDF
K12 Tableau User Group virtual event June 18, 2025
dogden2
 
PPTX
Pests of Maize: An comprehensive overview.pptx
Arshad Shaikh
 
PPTX
YSPH VMOC Special Report - Measles Outbreak Southwest US 6-14-2025.pptx
Yale School of Public Health - The Virtual Medical Operations Center (VMOC)
 
PPTX
INDUCTIVE EFFECT slide for first prof pharamacy students
SHABNAM FAIZ
 
PDF
Learning Styles Inventory for Senior High School Students
Thelma Villaflores
 
PPTX
Photo chemistry Power Point Presentation
mprpgcwa2024
 
PDF
Public Health For The 21st Century 1st Edition Judy Orme Jane Powell
trjnesjnqg7801
 
PPTX
List View Components in Odoo 18 - Odoo Slides
Celine George
 
PDF
Aprendendo Arquitetura Framework Salesforce - Dia 02
Mauricio Alexandre Silva
 
PPTX
NSUMD_M1 Library Orientation_June 11, 2025.pptx
Julie Sarpy
 
PPTX
Birnagar High School Platinum Jubilee Quiz.pptx
Sourav Kr Podder
 
PPTX
How to Add New Item in CogMenu in Odoo 18
Celine George
 
PPTX
F-BLOCK ELEMENTS POWER POINT PRESENTATIONS
mprpgcwa2024
 
PDF
HistoPathology Ppt. Arshita Gupta for Diploma
arshitagupta674
 
PDF
ECONOMICS, DISASTER MANAGEMENT, ROAD SAFETY - STUDY MATERIAL [10TH]
SHERAZ AHMAD LONE
 
PPTX
CRYPTO TRADING COURSE BY FINANCEWORLD.IO
AndrewBorisenko3
 
PPTX
Peer Teaching Observations During School Internship
AjayaMohanty7
 
PDF
Romanticism in Love and Sacrifice An Analysis of Oscar Wilde’s The Nightingal...
KaryanaTantri21
 
IIT KGP Quiz Week 2024 Sports Quiz (Prelims + Finals)
IIT Kharagpur Quiz Club
 
LAZY SUNDAY QUIZ "A GENERAL QUIZ" JUNE 2025 SMC QUIZ CLUB, SILCHAR MEDICAL CO...
Ultimatewinner0342
 
K12 Tableau User Group virtual event June 18, 2025
dogden2
 
Pests of Maize: An comprehensive overview.pptx
Arshad Shaikh
 
YSPH VMOC Special Report - Measles Outbreak Southwest US 6-14-2025.pptx
Yale School of Public Health - The Virtual Medical Operations Center (VMOC)
 
INDUCTIVE EFFECT slide for first prof pharamacy students
SHABNAM FAIZ
 
Learning Styles Inventory for Senior High School Students
Thelma Villaflores
 
Photo chemistry Power Point Presentation
mprpgcwa2024
 
Public Health For The 21st Century 1st Edition Judy Orme Jane Powell
trjnesjnqg7801
 
List View Components in Odoo 18 - Odoo Slides
Celine George
 
Aprendendo Arquitetura Framework Salesforce - Dia 02
Mauricio Alexandre Silva
 
NSUMD_M1 Library Orientation_June 11, 2025.pptx
Julie Sarpy
 
Birnagar High School Platinum Jubilee Quiz.pptx
Sourav Kr Podder
 
How to Add New Item in CogMenu in Odoo 18
Celine George
 
F-BLOCK ELEMENTS POWER POINT PRESENTATIONS
mprpgcwa2024
 
HistoPathology Ppt. Arshita Gupta for Diploma
arshitagupta674
 
ECONOMICS, DISASTER MANAGEMENT, ROAD SAFETY - STUDY MATERIAL [10TH]
SHERAZ AHMAD LONE
 
CRYPTO TRADING COURSE BY FINANCEWORLD.IO
AndrewBorisenko3
 
Peer Teaching Observations During School Internship
AjayaMohanty7
 
Romanticism in Love and Sacrifice An Analysis of Oscar Wilde’s The Nightingal...
KaryanaTantri21
 

ATTRIBUTE-BASED DATA SHARING SCHEME REVISITED IN CLOUD COMPUTING,bulk ieee projects ,

  • 1. CONTACT: PRAVEEN KUMAR. L (, +91 – 9791938249) MAIL ID: [email protected], [email protected] Web: www.nexgenproject.com, www.finalyear-ieeeprojects.com ATTRIBUTE-BASED DATA SHARING SCHEME REVISITED IN CLOUD COMPUTING ABSTRACT: Ciphertext-policy attribute-based encryption (CPABE) is a very promising encryption technique for secure data sharing in the context of cloud computing. Data owner is allowed to fully control the access policy associated with his data which to be shared. However, CP-ABE is limited to a potential security risk that is known as key escrow problem whereby the secret keys of users have to be issued by a trusted key authority. Besides, most of the existing CP-ABE schemes cannot support attribute with arbitrary state. In this paper, we revisit attribute-based data sharing scheme in order to solve the key escrow issue but also improve the expressiveness of attribute, so that the resulting scheme is more friendly to cloud computing applications. We propose an improved two-party key issuing protocol that can guarantee that neither key authority nor cloud service provider can compromise the whole secret key of a user individually. Moreover, we introduce the concept of attribute with weight, being provided to enhance the expression of attribute, which can not only extend the expression from binary to arbitrary state, but also lighten the complexity of access policy. Therefore, both storage cost and encryption complexity for a ciphertext are relieved. The performance analysis and security proof show that the proposed scheme is able to achieve efficient and secure data sharing in cloud computing. CONCLUSION
  • 2. CONTACT: PRAVEEN KUMAR. L (, +91 – 9791938249) MAIL ID: [email protected], [email protected] Web: www.nexgenproject.com, www.finalyear-ieeeprojects.com In this paper, we redesigned an attribute-based data sharing scheme in cloud computing. The improved key issuing protocol was presented to resolve the key escrow problem. It enhances data confidentiality and privacy in cloud system against the managers of KA and CSP as well as malicious system outsiders, where KA and CSP are semi-trusted. In addition, the weighted attribute was proposed to improve the expression of attribute, which can not only describe arbitrarystate attributes, but also reduce the complexity of access policy, so that the storage cost of ciphertext and time cost in encryption can be saved. Finally, we presented the performance and security analyses for the proposed scheme, in which the results demonstrate high efficiency and security of our scheme. REFERENCES [1] J. Baek, Q. H. Vu, J. K. Liu, X. Huang, and Y. Xiang. A secure cloud computing based framework for big data information management of smart grid. IEEE Transactions on Cloud Computing, 3(2):233–244, 2015. [2] A. Balu and K. Kuppusamy. An expressive and provably secure ciphertext- policy attribute-based encryption. Information Sciences, 276(4):354–362, 2014. [3] M. Belenkiy, J. Camenisch, M. Chase, M. Kohlweiss, A. Lysyanskaya, and H. Shacham. Randomizable proofs and delegatable anonymous credentials. Proceedings of the 29th Annual International Cryptology Conference, pages 108–125, 2009.
  • 3. CONTACT: PRAVEEN KUMAR. L (, +91 – 9791938249) MAIL ID: [email protected], [email protected] Web: www.nexgenproject.com, www.finalyear-ieeeprojects.com [4] J. Bethencourt, A. Sahai, and B. Waters. Ciphertext-policy attributebased encryption. IEEE Symposium on Security and Privacy, pages 321–334, 2007. [5] D. Boneh, B. Lynn, and H. Shacham. Short signatures from the weil pairing. Journal of Cryptology, 17(4):297–319, 2001. [6] M. Chase. Multi-authority attribute based encryption. Proceedings of the 4th Conference on Theory of Cryptography, pages 515–534, 2007. [7] M. Chase and S. S. Chow. Improving privacy and security in multiauthority attribute-based encryption. Proceedings of the 16th ACM Conference on Computer and Communications Security, pages 121–130, 2009. [8] L. Cheung and C. Newport. Provably secure ciphertext policy ABE. Proceedings of the 14th ACM conference on Computer and communications security, pages 456–465, 2007. [9] S. S. Chow. Removing escrow from identity-based encryption. Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography, pages 256–276, 2009. [10] C. K. Chu, W. T. Zhu, J. Han, J. K. Liu, J. Xu, and J. Zhou. Security concerns in popular cloud storage services. IEEE Pervasive Computing, 12(4):50–57, 2013. [11] A. De Caro and V. Iovino. JPBC: java pairing based cryptography. IEEE sSymposium on Computers and Communications, 22(3):850–855, 2011.